Presentation is loading. Please wait.

Presentation is loading. Please wait.

LANDesk Endpoint Security Audit 2.5

Similar presentations


Presentation on theme: "LANDesk Endpoint Security Audit 2.5"— Presentation transcript:

1 LANDesk Endpoint Security Audit 2.5
Danny Huang LANDesk Jan 2014

2 Increase Productivity
What Endpoint Security Audit can do for you? IT Security Audit for enterprises Data Loss Tracking Critical file leak: Copy Print IM Monitoring & Controlling Enforce Security Policy: USB Block Unsafe APP User Behavior Checking Unrelated to work things Game Surf web IM chatting Stock trading Reduce Risks Enforce Policy Increase Productivity

3 Manage Security Audit Before Happening After
LANDesk Desktop Management / Security / Audit Solutions Manage Security Audit Before Happening After LANDesk Management Suite LANDesk Security Suite LANDesk Security Audit

4 Logging user all operation
Lifecycle Security Audit Turn ON User login Document Create, Edit, Delete… User logout Turn Off Logging user all operation Print, Copy… Game, Surf web, IM…

5 Document Application Operation Network
360° Security Audit Doc Audit - File operation - Print App Audit - App usage - Active Window Title - Screenshots Security Audit Document Application Operation Network Operation Audit - On/Off Login/Logout - USB Usage - Copy/ Paste Network Audit - Surf web - - IM chatting ESA Pro 3.0

6 Product roadmap ESA 1.x 2011-2012 ESA 2.x 2013-2014 ESA 3.x 2014-2016
Marketing Trial File Opt, Screenshot, Print Log Web Access Log Mail Log Critical File Read Log ESA 1.x ESA 2.x ESA 3.x ESA 4.x Application, Active Title Log Clipboard, USB Disk Log Logon/logoff, System Change Log Web Access Log (Trail) BYOD / Cloud Clients Mobile Device Audit Log

7 Get better understand how end user are using software.
Software usage logging Get better understand how end user are using software.

8 Get better understand how end user are using their computers.
Turn ON/OFF, Login/Logoff logging Get better understand how end user are using their computers. Work at weekends

9 Surf web logging Get better understand how end user are using network.
Web title, URL, Port, time… Surf web logging, even not in Corp network

10 File name, folder, operation, time, user…
File operation logging File name, folder, operation, time, user…

11 Get better understand how end user are using printer.
Print logging Get better understand how end user are using printer. Doc name, printer name User, IP, Pages

12 Windows title, process name, time, user…
Active window title logging Windows title, process name, time, user…

13 Application usage logging
App name, time, version…

14 Screenshot logging

15 Screenshot logging Screenshot can be triggered by time, specified application. For example: only when end user use Skype will do screenshot. Can search picture content, high compressed picture save storage space. Picture can be showed as video, and can be exported. Web IM Word

16 Screenshot logging Replay IM (Skype / QQ / MSN) chatting.

17 Screenshot logging Online video

18 Turn ON/OFF Login/Logout Logging
Turn On, Login Lock screen, Login

19 System information change logging
In another network Business trip… In different time zone, abroad… Change: Hostname, IP, Time zone…

20 USB device usage logging
Get better understand how end user are using USB device. USB storage plug in/out Name and Type

21 Copy files from local and network drives
Clipboard logging Copy files from local and network drives Copy Content File name, Content

22 IM chatting logging Chatting content User: From, To, Group
File transfer

23 High light User abnormity behavior
User abnormity behavior logging High light User abnormity behavior

24 User abnormity behavior logging
Search by user, IP, keyword and export to CSV files All behavior relate to the keyword“QQ”

25 Create queries by different parameters
Log query Create queries by different parameters

26 Alert rule、email template,
User abnormity behavior alert Alert rule、 template, Alert admin by

27 Watching movie in work time IM Chatting in work time
User abnormity behavior alert Watching movie in work time IM Chatting in work time

28 Individual enable/disable logging Move to different groups
Multiple logging rule for different BU/User Individual enable/disable logging Move to different groups

29 Up to 10000 nodes, low net work usage
Support multiple file servers Use different logging rule to lower net work usage

30 LANDesk ESA topologic ESA File Servers All log keep in DB/file server
PC / NC Notebook logging ESA File Servers Desktop management Audit log Client Core Server All log keep in DB/file server Support up to clients Desktop management ESA console LDMS console

31 Supported platforms Server: Client: Support language :
Windows Server 2008 R2 or higher SQL Server 2005SP3 / 2008 R2 or higher .NET Framework 4.0 or higher Client: Windows XP / Vista / Windows 7 / 8 Support language : Server:English / Japanese / Chinese Client: English / Japanese / Chinese

32 Medalsoft Consulting Services
Profile: Founded: 2011 CAGR: 25% Shanghai: 25+ people, Shenzhen Branch: 10+ people Tokyo Office: 2+ people Target: To be a top 10 professional solution provider in Cloud Computer area in China. To be listed in OTC SH within 3-5 years Products & Solutions: SharePoint / Office 365 Consulting Services & Apps BPM Consulting Services ESA & ITAM & ITSM Solutions (LANDesk) Clients & Partners: 100+ Clients Customer Satisfaction: 99% Microsoft, LANDesk, Kingsoft (China), FlowPotal BPM (China), Clover-Sun (Japan)

33 Our Products & Solutions
Enterprise Information Portal (SharePoint & SharePoint Online) EIP Medalsoft BPM ITIL IT Asset Management IT Service Management Endpoint Security Audit - PC Operation Logs Business Process Management

34 Work with LANDesk Endpoint Security Audit: Asset Lifecycle Management:
Released ESA 2.x version. Won more than 10+ clients (20000 nodes+) in China. More than RMB2,000,000 revenue contributed indirectly. Technical Support to Japan team & South Asia team. Asset Lifecycle Management: More than 10+ ALM projects delivered. More than RMB3,000,000 revenue contributed indirectly. Delivered Almost 80% ALM projects in China. Management Suite: More than 50+ LDMS projects’ support provided. More than 10+ projects delivered (Customization Development). Technical support to South China & East China teams Service Desk: Started LDSD Consulting Services from 2013 Started one LDSD project in 2013

35


Download ppt "LANDesk Endpoint Security Audit 2.5"

Similar presentations


Ads by Google